Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe
Resource
win10v2004-20240221-en
General
-
Target
a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe
-
Size
487KB
-
MD5
a4445bb89915e444b9ac05b059049ce3
-
SHA1
1efe22adb89b971fa2313f6122627375e57b1806
-
SHA256
a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d
-
SHA512
6e99ec470a3dcee764ea9defa3692e5842b4064de7272c5f1746b3f0a7dc2e877429e07eb1e428299ab585e126b1d852fe7137bb96e0e4094416663186965036
-
SSDEEP
6144:NuJPz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fayCV7E:y1gL5pRTcAkS/3hzN8qE43fm78V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2500 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1524 Logo1_.exe 2540 a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe -
Loads dropped DLL 1 IoCs
pid Process 2500 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Access.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zG.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{B1D2683D-49C7-4D49-BF73-D631FD2FBA0D}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe File created C:\Windows\Logo1_.exe a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1524 Logo1_.exe 1524 Logo1_.exe 1524 Logo1_.exe 1524 Logo1_.exe 1524 Logo1_.exe 1524 Logo1_.exe 1524 Logo1_.exe 1524 Logo1_.exe 1524 Logo1_.exe 1524 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2500 1364 a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe 28 PID 1364 wrote to memory of 2500 1364 a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe 28 PID 1364 wrote to memory of 2500 1364 a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe 28 PID 1364 wrote to memory of 2500 1364 a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe 28 PID 1364 wrote to memory of 1524 1364 a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe 30 PID 1364 wrote to memory of 1524 1364 a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe 30 PID 1364 wrote to memory of 1524 1364 a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe 30 PID 1364 wrote to memory of 1524 1364 a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe 30 PID 1524 wrote to memory of 2620 1524 Logo1_.exe 31 PID 1524 wrote to memory of 2620 1524 Logo1_.exe 31 PID 1524 wrote to memory of 2620 1524 Logo1_.exe 31 PID 1524 wrote to memory of 2620 1524 Logo1_.exe 31 PID 2620 wrote to memory of 2564 2620 net.exe 33 PID 2620 wrote to memory of 2564 2620 net.exe 33 PID 2620 wrote to memory of 2564 2620 net.exe 33 PID 2620 wrote to memory of 2564 2620 net.exe 33 PID 2500 wrote to memory of 2540 2500 cmd.exe 34 PID 2500 wrote to memory of 2540 2500 cmd.exe 34 PID 2500 wrote to memory of 2540 2500 cmd.exe 34 PID 2500 wrote to memory of 2540 2500 cmd.exe 34 PID 1524 wrote to memory of 1204 1524 Logo1_.exe 17 PID 1524 wrote to memory of 1204 1524 Logo1_.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe"C:\Users\Admin\AppData\Local\Temp\a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a47BA.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe"C:\Users\Admin\AppData\Local\Temp\a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe"4⤵
- Executes dropped EXE
PID:2540
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2564
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
474KB
MD549d25f7edc57e78ded3a83c1f8e1f6f3
SHA181c2d584e3409a5cae8fcd856434d65278f6fddd
SHA256360495e8156fc825fdf82a2358f54f101cbf25b39365b99003cdcaae249e1606
SHA51252317cd28499a5387961d508118c9ab5d88937cca6e7440874a3ff9b5bc17398c1f4de1b7591e8064182586adec404376981801eaa215dab7daa75f51598dbc4
-
Filesize
722B
MD5a137a9d62db63db024b2392d8be8278e
SHA18b1dd455f734f9f967074e3ce22916b0a33d8340
SHA256c33266817b91f5521963315159430429da95f43c8176599eb26af1e91f03a04e
SHA512b1546fd5701a2f06051e96f094867a67c68417c9185f79096739ecace8cbc86c3cae91d0fc07c15051dd4e4826acc9c01407c7ec611274e18d8c430b5b5da205
-
C:\Users\Admin\AppData\Local\Temp\a6f51f748342c15c1bba7f24af4cf78881c03fecce722ece212137574873677d.exe.exe
Filesize458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
29KB
MD5d014f0d4e32db60ddeb4a1fb3d196b7d
SHA10aed23f1d71795bd8494f4b1cfbf379e6e5d3fa6
SHA256c2f650792ca6a40a43bf6538def0d09a852985eaadbbdc69ff81d624b41a6061
SHA5125410ad7edc070fd8a32f5a9f2ad2ea7451bd8bdef3c772568f91209b43c663ac252fd483096f17d560d0ba2655a9adb021fa7c9b5bc2646c9b6ace5a5d7d57e8
-
Filesize
9B
MD570eb801394f34df3f5d5478555204e02
SHA17da7e3e98fa5f4b19b7c862670f7bafd17e69dca
SHA256e4693937004168f1be952c09866d8661d845e28e9a15f989ca440d499cfe76ec
SHA512dae67b2c69a4ac6358f286e98d0eee9e97536cab4a24d99360b3556adcfdb00eded3ca6891843855e43b0c493dc99b60c8d01c72570eb6f7bcf0f4ff079bf98e